Search results for: Dimitris Gritzalis
Lecture Notes in Computer Science > Critical Information Infrastructures Security > Session 8: Threats and Attacks Modeling > 299-310
Lecture Notes in Computer Science > Computer Security - ESORICS 2008 > Session 10: VoIP Security, Malware, and DRM > 446-460